This document discusses several legal issues related to big data, including intellectual property rights, contract law and licensing, privacy and data protection, due process, liability, and jurisdictional problems. It notes that big data raises issues around rights clearing for copyrighted data, outdated exemptions, legal fragmentation across jurisdictions, enforceability of clickwrap licenses, definitions of personal data, ensuring transparency and auditing of decision-making logic, assigning liability in converged cloud services, and managing multiple applicable laws across jurisdictions. The document argues that harmonization of laws may help address some of the jurisdictional problems with applying legal frameworks to large-scale, multi-jurisdictional uses of big data.
Semantic Web and Blockchain for Decentralized and Web-wide Content Management in the Era of Social Media
Digitalisation and the web have made it difficult for content owners to manage their rights, keep track of how their content is used and paid for. Creators also struggle to be paid royalties in a timely way. While changes are needed, a balance is required so that creativity is not stifled with a resulting loss to society. These challenges require mechanisms that scale to the Web but take into account the subtleties of the underlying copyright regimes, including moral rights, fair use and other exceptions.
We propose using Web 3.0 technologies - ranging from semantic technologies to blockchain. Semantic technologies provide knowledge representation tools capable of modelling copyright and enable computer-supported rights management. Blockchain with smart contracts makes it possible to both register copyright and record transactions in a trustless environment while providing for automatic execution of the smart contract’s terms.
Together, semantic representations like Copyright Ontology smart contracts provide a promising foundation to build a decentralised platform capable of dealing with rights management at the Web scale and enable new business models that better accommodate copyright in the era of social media.
Technology tipping points Big Data and Blockchain use case presentationVinod Kumar Nerella
In this presentation, I am talking about the two technology tipping points big data and Blockchain.
In big data area, the presentation covers use cases in retails, financial and manufacturing sector.
Block chain and its main concepts are explained with the use case smart contracts is introduction and Blockchain can help manufacturing firms for efficient operations.
Blockchain is a shared, distributed ledger that facilitates recording transactions and tracking assets in a business network. Anything of value can be tracked and traded, reducing risk and costs. Blockchain provides transparency, security, auditability, and resistance to outages through its decentralized structure. The document then lists industries like banking, cybersecurity, and supply chain management that blockchain will disrupt before discussing smart contracts and their ability to automatically enforce obligations like traditional contracts. It concludes with cryptocurrency market statistics and the forecast for blockchain adoption worldwide between 2017-2030.
rights and responsibilities
privacy by design strategies
privacy principles
privacy enhancing technologies (PETs)
big data concerns
private, shared and public - boundary transitions
data protection impact assessment (DPIA)
cross border data transfers
derogations for research
This document discusses several legal issues related to big data, including intellectual property rights, contract law and licensing, privacy and data protection, due process, liability, and jurisdictional problems. It notes that big data raises issues around rights clearing for copyrighted data, outdated exemptions, legal fragmentation across jurisdictions, enforceability of clickwrap licenses, definitions of personal data, ensuring transparency and auditing of decision-making logic, assigning liability in converged cloud services, and managing multiple applicable laws across jurisdictions. The document argues that harmonization of laws may help address some of the jurisdictional problems with applying legal frameworks to large-scale, multi-jurisdictional uses of big data.
Semantic Web and Blockchain for Decentralized and Web-wide Content Management in the Era of Social Media
Digitalisation and the web have made it difficult for content owners to manage their rights, keep track of how their content is used and paid for. Creators also struggle to be paid royalties in a timely way. While changes are needed, a balance is required so that creativity is not stifled with a resulting loss to society. These challenges require mechanisms that scale to the Web but take into account the subtleties of the underlying copyright regimes, including moral rights, fair use and other exceptions.
We propose using Web 3.0 technologies - ranging from semantic technologies to blockchain. Semantic technologies provide knowledge representation tools capable of modelling copyright and enable computer-supported rights management. Blockchain with smart contracts makes it possible to both register copyright and record transactions in a trustless environment while providing for automatic execution of the smart contract’s terms.
Together, semantic representations like Copyright Ontology smart contracts provide a promising foundation to build a decentralised platform capable of dealing with rights management at the Web scale and enable new business models that better accommodate copyright in the era of social media.
Technology tipping points Big Data and Blockchain use case presentationVinod Kumar Nerella
In this presentation, I am talking about the two technology tipping points big data and Blockchain.
In big data area, the presentation covers use cases in retails, financial and manufacturing sector.
Block chain and its main concepts are explained with the use case smart contracts is introduction and Blockchain can help manufacturing firms for efficient operations.
Blockchain is a shared, distributed ledger that facilitates recording transactions and tracking assets in a business network. Anything of value can be tracked and traded, reducing risk and costs. Blockchain provides transparency, security, auditability, and resistance to outages through its decentralized structure. The document then lists industries like banking, cybersecurity, and supply chain management that blockchain will disrupt before discussing smart contracts and their ability to automatically enforce obligations like traditional contracts. It concludes with cryptocurrency market statistics and the forecast for blockchain adoption worldwide between 2017-2030.
rights and responsibilities
privacy by design strategies
privacy principles
privacy enhancing technologies (PETs)
big data concerns
private, shared and public - boundary transitions
data protection impact assessment (DPIA)
cross border data transfers
derogations for research
IT Governance: Privacy and Intellectual PropertyCharles Mok
This document summarizes a presentation on privacy, intellectual property, and related public sector issues in Hong Kong. It discusses data breaches that exposed personal information in Hong Kong and the UK. It emphasizes developing a culture that balances convenience, security, and privacy. It also outlines the key principles of Hong Kong's Personal Data Privacy Ordinance, including purpose limitation, accuracy, use limitation, security, openness, access, and correction. Finally, it discusses consultations on revising this ordinance and digital copyright law.
This document discusses open access to legislation in Romania. It notes that while there are currently several public databases of legislation, access is limited and the data is not open. However, opening legislation as open data represents a high opportunity, as the raw data is already available electronically and could be easily opened at low cost. Open data has social, economic, and transparency benefits. The document outlines some projects underway in Romania to improve access to legislation, including the N-lex project by the Ministry of Justice to provide free electronic access to the national legislative database. In conclusion, while open access to Romanian legislation does not currently exist, legislation represents an extremely viable domain for open data.
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)Jausloos
This document discusses the right to be forgotten and analyzes it through different legal frameworks such as data protection law, privacy law, and defamation law. It examines how the right to erasure under the Data Protection Directive allows individuals to request data controllers erase personal data when its processing no longer complies with the law due to being incomplete or inaccurate over time. The document also summarizes the 2014 Google Spain case where the CJEU established territorial and temporal limitations on the right to be forgotten online. It concludes that balancing various factors like public interest, context, an individual's notoriety, and the passage of time is needed when determining right to erasure requests.
This document discusses blockchain technology and its potential applications in healthcare. It begins with basic explanations of blockchain, including definitions, technical components, and different models (public, private, consortium). Examples of existing blockchain platforms for healthcare are provided, such as using blockchain for biomedical research and patient recruitment. The document aims to serve as an introduction and guide for how blockchain could address business needs in the healthcare industry.
The document discusses dati.piemonte.it, an open data platform launched by the Piedmont region of Italy. It provides guidelines for publishing open data, including making data available at marginal cost, using open licenses, and allowing comments and suggestions from users. The goals of the platform are to increase transparency, enable public participation, and foster new business opportunities using the data. So far it has published around 45 datasets that have been downloaded over 2,300 times, with growing interest from both the public and private sectors. The vision is for dati.piemonte.it to help establish a systematic model of open data publication and exchange to facilitate value creation.
e-CODEX is an EU project that focuses on online communication and data exchange. It aims to provide secure identification, electronic signatures, and structured data exchange between EU services. The project promotes transparency by allowing public access to business registers and administrative information. It also considers issues around data protection, privacy, and individuals' right to data portability under EU law. Both costs and control of data transmission are important factors to consider for any e-CODEX system.
The Privacy Advantage 2016 - Ruth BoardmanKrowdthink
This document discusses key aspects of the EU's General Data Protection Regulation (GDPR) in 16 pages. It covers definitions of personal and sensitive personal data; individual rights like access, rectification, and erasure; pseudonymization; data management considerations; and codes of conduct and certification. The document aims to explain major provisions of the new privacy law and implications for companies' data practices.
Presentation on citizen-consumer permission-based data sharing, the four challenge areas in data innovation and the Personal Data & Trust program by Dr Matt Stroud, Head of Personal Data and Trust at Digital Catapult Centre. Presented at the Data-sharing Discovery Day on 26 January in London.
Data portability and interoperability standards have advanced since the 1990s but still have limitations. The GDPR strengthened data portability rights in the EU in 2018 but implementation remains slow. Open issues include the exact scope of portable data and acceptable formats. The OpenXPort project aims to improve data portability using emerging JMAP standards for contacts and calendars. Widespread adoption of standards like JMAP could significantly improve cross-service data portability.
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
This document summarizes key aspects of India's proposed Personal Data Protection Bill, 2019. It discusses the bill's applicability, categories of protected data, data controller obligations, rights of data subjects, provisions around children's data, and penalties. It also outlines rules for data localization and cross-border data transfers, noting sensitive personal data must stay in India unless an exception applies. The bill aims to strengthen data protection for Indian citizens and regulate how their personal information is collected and used.
This is the presentation used during the January 21st 2019 lecture at the Faculty of Law, Singapore Management University. It is ad adaptation (with some remarkable updates and changes) to the presentation used in the 2017 edition of the TRN conference and already available in my profile. Content has been adapted and some slides removed for confidentiality reasons. Most of the references have to be intended to the Singaporean law.
The implementation of a blockchain platform may facilitate the exchange of information among the parties involved in the process. This can be achieved by storing the cargo information on the ledger. Instead of exchanging documentation, the parties involved in the process are granted permission to access the block where the information is stored. This leads to the creation of a unique, shared piece of information which can be accessed in real-time and with lower transaction costs. The process can be further accelerated by including parties that are currently external to the process (banks, insurance companies).
The document discusses dati.piemonte.it, an open data platform launched by the Piedmont region of Italy. It provides open access to public sector data and information to enable new business opportunities and participation. The platform makes over 45 datasets available under open licenses for anyone to access and reuse. It has seen over 2300 datasets downloaded and 13,500 website visitors. The vision is for dati.piemonte.it to continue expanding open access to regional data and foster new value creation and business models through participation and a linked open data approach.
The document discusses incentive mechanisms for privacy-preserving Internet of Things (IoT). It addresses common misconceptions about privacy in IoT and discusses how incentive mechanisms can encourage user participation while balancing privacy and accuracy. Specifically, it notes that incentive mechanisms, like reverse auctions, are needed to attract crowdsensing users to contribute data. However, these mechanisms must also consider users' varying privacy levels and how coalitions can impact privacy. The document examines how user contributions, payoffs, and coalitions should be handled to optimize this accuracy-privacy tradeoff.
The document discusses data protection issues related to the Internet of Things (IoT) under EU law, outlining privacy challenges identified by the EU's Article 29 Working Party including lack of user control, quality of consent, security risks, and limitations on anonymity, and it summarizes relevant EU data protection principles governing the collection and processing of personal data from IoT devices.
2014 Internet and ECommerce Law UpdateGraham Smith
This document summarizes Graham Smith's annual IT law update presentation from October 2014. It reviews key issues from 2013 including the Digital Economy Act, Defamation Act, and EU copyright cases. It also summarizes major copyright and internet cases from 2014 regarding browsing copies, site blocking injunctions, metasearch and database rights, cross-border liability, and data retention laws. The document concludes by looking ahead to upcoming issues in online copyright, social media offenses, electronic signatures, and the EU copyright review.
1º Palestra sobre Proteção de Dados PessoaisIBE_USP
This document summarizes key aspects of privacy and data protection law in the EU and discusses ongoing reforms.
It outlines the context of increasing data collection and use with digital technologies. EU law establishes privacy and data protection as fundamental rights. The EU Data Protection Directive of 1995 set rules for processing personal data, including rights for individuals.
Reforms aim to strengthen these protections in the interconnected modern context by making regulations more consistent, clarifying international transfer rules with tools like adequacy assessments and binding corporate rules, and increasing accountability and enforcement for data controllers. The reforms seek to ensure privacy protections can continue adapting to new technologies and data uses.
IT Governance: Privacy and Intellectual PropertyCharles Mok
This document summarizes a presentation on privacy, intellectual property, and related public sector issues in Hong Kong. It discusses data breaches that exposed personal information in Hong Kong and the UK. It emphasizes developing a culture that balances convenience, security, and privacy. It also outlines the key principles of Hong Kong's Personal Data Privacy Ordinance, including purpose limitation, accuracy, use limitation, security, openness, access, and correction. Finally, it discusses consultations on revising this ordinance and digital copyright law.
This document discusses open access to legislation in Romania. It notes that while there are currently several public databases of legislation, access is limited and the data is not open. However, opening legislation as open data represents a high opportunity, as the raw data is already available electronically and could be easily opened at low cost. Open data has social, economic, and transparency benefits. The document outlines some projects underway in Romania to improve access to legislation, including the N-lex project by the Ministry of Justice to provide free electronic access to the national legislative database. In conclusion, while open access to Romanian legislation does not currently exist, legislation represents an extremely viable domain for open data.
The Right to be Forgotten - It's About Time, or is it? (CPDP2014)Jausloos
This document discusses the right to be forgotten and analyzes it through different legal frameworks such as data protection law, privacy law, and defamation law. It examines how the right to erasure under the Data Protection Directive allows individuals to request data controllers erase personal data when its processing no longer complies with the law due to being incomplete or inaccurate over time. The document also summarizes the 2014 Google Spain case where the CJEU established territorial and temporal limitations on the right to be forgotten online. It concludes that balancing various factors like public interest, context, an individual's notoriety, and the passage of time is needed when determining right to erasure requests.
This document discusses blockchain technology and its potential applications in healthcare. It begins with basic explanations of blockchain, including definitions, technical components, and different models (public, private, consortium). Examples of existing blockchain platforms for healthcare are provided, such as using blockchain for biomedical research and patient recruitment. The document aims to serve as an introduction and guide for how blockchain could address business needs in the healthcare industry.
The document discusses dati.piemonte.it, an open data platform launched by the Piedmont region of Italy. It provides guidelines for publishing open data, including making data available at marginal cost, using open licenses, and allowing comments and suggestions from users. The goals of the platform are to increase transparency, enable public participation, and foster new business opportunities using the data. So far it has published around 45 datasets that have been downloaded over 2,300 times, with growing interest from both the public and private sectors. The vision is for dati.piemonte.it to help establish a systematic model of open data publication and exchange to facilitate value creation.
e-CODEX is an EU project that focuses on online communication and data exchange. It aims to provide secure identification, electronic signatures, and structured data exchange between EU services. The project promotes transparency by allowing public access to business registers and administrative information. It also considers issues around data protection, privacy, and individuals' right to data portability under EU law. Both costs and control of data transmission are important factors to consider for any e-CODEX system.
The Privacy Advantage 2016 - Ruth BoardmanKrowdthink
This document discusses key aspects of the EU's General Data Protection Regulation (GDPR) in 16 pages. It covers definitions of personal and sensitive personal data; individual rights like access, rectification, and erasure; pseudonymization; data management considerations; and codes of conduct and certification. The document aims to explain major provisions of the new privacy law and implications for companies' data practices.
Presentation on citizen-consumer permission-based data sharing, the four challenge areas in data innovation and the Personal Data & Trust program by Dr Matt Stroud, Head of Personal Data and Trust at Digital Catapult Centre. Presented at the Data-sharing Discovery Day on 26 January in London.
Data portability and interoperability standards have advanced since the 1990s but still have limitations. The GDPR strengthened data portability rights in the EU in 2018 but implementation remains slow. Open issues include the exact scope of portable data and acceptable formats. The OpenXPort project aims to improve data portability using emerging JMAP standards for contacts and calendars. Widespread adoption of standards like JMAP could significantly improve cross-service data portability.
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
This document summarizes key aspects of India's proposed Personal Data Protection Bill, 2019. It discusses the bill's applicability, categories of protected data, data controller obligations, rights of data subjects, provisions around children's data, and penalties. It also outlines rules for data localization and cross-border data transfers, noting sensitive personal data must stay in India unless an exception applies. The bill aims to strengthen data protection for Indian citizens and regulate how their personal information is collected and used.
This is the presentation used during the January 21st 2019 lecture at the Faculty of Law, Singapore Management University. It is ad adaptation (with some remarkable updates and changes) to the presentation used in the 2017 edition of the TRN conference and already available in my profile. Content has been adapted and some slides removed for confidentiality reasons. Most of the references have to be intended to the Singaporean law.
The implementation of a blockchain platform may facilitate the exchange of information among the parties involved in the process. This can be achieved by storing the cargo information on the ledger. Instead of exchanging documentation, the parties involved in the process are granted permission to access the block where the information is stored. This leads to the creation of a unique, shared piece of information which can be accessed in real-time and with lower transaction costs. The process can be further accelerated by including parties that are currently external to the process (banks, insurance companies).
The document discusses dati.piemonte.it, an open data platform launched by the Piedmont region of Italy. It provides open access to public sector data and information to enable new business opportunities and participation. The platform makes over 45 datasets available under open licenses for anyone to access and reuse. It has seen over 2300 datasets downloaded and 13,500 website visitors. The vision is for dati.piemonte.it to continue expanding open access to regional data and foster new value creation and business models through participation and a linked open data approach.
The document discusses incentive mechanisms for privacy-preserving Internet of Things (IoT). It addresses common misconceptions about privacy in IoT and discusses how incentive mechanisms can encourage user participation while balancing privacy and accuracy. Specifically, it notes that incentive mechanisms, like reverse auctions, are needed to attract crowdsensing users to contribute data. However, these mechanisms must also consider users' varying privacy levels and how coalitions can impact privacy. The document examines how user contributions, payoffs, and coalitions should be handled to optimize this accuracy-privacy tradeoff.
The document discusses data protection issues related to the Internet of Things (IoT) under EU law, outlining privacy challenges identified by the EU's Article 29 Working Party including lack of user control, quality of consent, security risks, and limitations on anonymity, and it summarizes relevant EU data protection principles governing the collection and processing of personal data from IoT devices.
2014 Internet and ECommerce Law UpdateGraham Smith
This document summarizes Graham Smith's annual IT law update presentation from October 2014. It reviews key issues from 2013 including the Digital Economy Act, Defamation Act, and EU copyright cases. It also summarizes major copyright and internet cases from 2014 regarding browsing copies, site blocking injunctions, metasearch and database rights, cross-border liability, and data retention laws. The document concludes by looking ahead to upcoming issues in online copyright, social media offenses, electronic signatures, and the EU copyright review.
1º Palestra sobre Proteção de Dados PessoaisIBE_USP
This document summarizes key aspects of privacy and data protection law in the EU and discusses ongoing reforms.
It outlines the context of increasing data collection and use with digital technologies. EU law establishes privacy and data protection as fundamental rights. The EU Data Protection Directive of 1995 set rules for processing personal data, including rights for individuals.
Reforms aim to strengthen these protections in the interconnected modern context by making regulations more consistent, clarifying international transfer rules with tools like adequacy assessments and binding corporate rules, and increasing accountability and enforcement for data controllers. The reforms seek to ensure privacy protections can continue adapting to new technologies and data uses.
Presentation of the USEMP and Privacy Flag projects during INFO-COM 2015, Athens, Greece, discussing about privacy and risks in today's electronic world
20131009 aon security breach legislationJos Dumortier
The document discusses recent EU legislation around security breach notification duties. It summarizes that the 2009 EU ePrivacy Directive first introduced security breach notification requirements for telecom providers and ISPs. Recent EU proposals aim to expand these duties to other sectors by 1) extending notification to data protection authorities and individuals under the 2012 General Data Protection Regulation and 2) requiring notifications for public administrations and critical infrastructure operators under the 2013 Network and Information Security Directive. The proposals seek to increase harmonization of security breach response across EU member states but questions remain around practical implementation details.
TPP and Digital Rights: Indonesian Perspective OverviewICT Watch
This is a very brief review of Trans Pacific Partnership (TPP) from Indonesian perspective, focused on 2 provision that related to the digital rights, e-commerce and intellectual property.
Summary of the 5 TPP's Impacts:
Cross-border Data Transfer
- TPP: restriction of cross-border digital data transfer is not allowed
- standard for data and personal information?
- Jurisdiction? Bilateral /multilateral agreement?
Data Center Territory
- TPP: computing facility / data center localization is not allowed
- Indonesian Government Regulation No. 82/2012?
- Localization = trade barrier? Market (traffic) domination?
Copyrighted Digital Content
- TPP: immediate remove/disable digital content of the copyright infringement
- Liability of service providers? User-generated content?
- Regulation? Procedure? How about fair-use?
Trade Secret in Computer System
- TPP: unauthorized access of trade secret in a computer system is a criminal
- Revelation of a corporate wrongdoing is criminal?
- New threat for whistleblower, journalist or netizen who tell the truth?
Internet Access for Consumer
- TPP: Consumer’s Internet access subject to “reasonable network management”
- Justification for “reasonable”? Unjustifiable discriminatory?
- Limitation of “network management” practice? Net neutrality?
e-Transmission Custom Duties
- TPP: custom duties on electronic transmission is not allowed
- Global operators’ revenues are stagnating, operating and capital expenditures are increasing. Meanwhile, the “over-the-top” (OTT) players that piggyback free on telecom systems are gaining in number and popularity, making the traditional operators’ task that much more difficult* ?
- Taxing of over-the-top (OTT) services? Digital products?
Compiled by ICT Watch - Indonesia.
*) http://www.strategyand.pwc.com/perspectives/2015-telecommunications-trends
This document provides an overview and status update on data protection legislation in India. It discusses the existing legal framework, the growth of investment in India's IT sector which handles personal data, and the need for data protection laws. Several attempts have been made to pass such legislation, including drafting a separate law or amending the existing Information Technology Act. The most recent recommendations proposed amendments to the IT Act by an expert committee, but no legislation has been enacted yet. The document concludes that comprehensive data protection legislation is still needed in India to provide adequate protection for personal data.
This webinar gives an overview of:
- The regulation landscape
- Territorial scope
- Remedies, liabilities and penalties
- Privacy notices
- The right of data subject
- Consent
- Data processing
- Profiling or "automated individual decision-making"
- International marketing and data transfers
A recording of this webinar is available here:
https://www.youtube.com/watch?v=Vr_CT24v2iI
The Center for Democracy & Technology filed a complaint with the Federal Trade Commission requesting an investigation into Hotspot Shield VPN's data sharing and security practices. The complaint alleges that Hotspot Shield makes strong claims about not tracking or logging user data, but its privacy policy describes more extensive logging. It is also alleged that Hotspot Shield uses third-party tracking libraries to facilitate targeted advertisements, contradicting its promises of privacy and security.
Service provider liability: Legal Issues in Research Data Collection and Shar...EUDAT
| www.eudat.eu | v1.0, June 2014 - Are hosting providers liable for the data that they store? And what about if they do not have actual knowledge of illegal activity? Are you sure that contractual liability limitations (eg. in Terms of Service) provide you with the right protection? This module addresses such questions. Download the presentation and find out.
Who is it for?: Researchers, Data Managers, General public.
Discussion of the main elements of the draft Data Protection Regulation: what difference will it make to industry practice and user rights to control their data?
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The document describes an Intelligent Policies Analysis Mechanism (IPAM) that is part of the ADVOCATE framework. IPAM uses machine learning methods like Fuzzy Cognitive Maps and Extreme Learning Machines to identify potentially conflicting rules or consents from a user that could lead to personal data collection and profiling without consent. The framework aims to help users maintain control over their personal data as required by GDPR regulations. IPAM simulates how smart devices collect personal data and identifies rules that may enable profiling, training on example data to learn how to detect such instances.
Are blockchain and EU-GDPR compatible? This presentation from 2020, from Dennis Hillemann (Podcast: The Blockchain lawyer), explains the most important legal challenges. The presentation explains:
- What are basic principles of GDPR?
- What are basic functionalities of the blockchain technology?
- What main issues are there between GDPR and blockchain technology?
- What is personal data in a blockchain scenario?
- Personal data & encryption and & hashing
- Salting and Peppering
- Data processor and controller in a blockchain scneario
- Right to rectification and right to erasure
- Transfer to third countries
- National and internatinal activities to bring Blockchain and GDPR together.
The document discusses Brazil's Marco Civil law and its implications for cloud services. It provides background on the development of Marco Civil from 2009-2014 through a civil society process. Key points of Marco Civil include establishing principles of network neutrality, data protection, and non-liability of intermediaries. For cloud services, the law specifies requirements for data storage timeframes, access protocols, and security standards. Overall, Marco Civil aims to balance an open internet with basic privacy protections.
The document discusses national and international responses to cybercrime. It provides background on computer fraud statistics in the UK and Ireland. It discusses early cases of unauthorized computer access in the UK, including R v Gold & Schifreen, and how this led to the Computer Misuse Act of 1990. It then covers the Council of Europe Cybercrime Convention, which aims to harmonize cybercrime laws. Ireland has signed this convention. The document also discusses recommendations and guidelines from organizations like the OECD concerning cybersecurity policies and information sharing.
Cloud computing involves storing and accessing data and programs over the Internet instead of a local computer's hard drive. There are concerns about data privacy and security with cloud computing due to the international nature of data storage. The location of data centers impacts jurisdiction, laws, costs and environmental issues. Different countries and regions like the EU have different approaches to data protection and privacy laws that may conflict regarding cloud computing data. Solutions proposed to address these issues include international agreements, data localization, and self-regulation models.
Similar to Browser-based Crypto M, C. F Mondschein (20)
This document discusses intrusion detection systems, including common attack patterns like port, ping, and login sweeps. It outlines Snort as an example network-based intrusion detection system and provides Snort rule examples. Different types of intrusion detection systems are also covered, along with considerations for host-based versus network-based placement.
This document outlines key network protocols including ARP, SYN, FTP, ICMP, DNS, port scans, SYN floods, and the application layer. It discusses how these protocols work from the bit level up through data encapsulation using Ethernet, IP, and TCP. Specific topics covered include the three-way handshake, how ARP maps IP addresses to MAC addresses, SYN scans, the FTP protocol, ICMP, DNS name resolution, types of port scans, and SYN floods as a denial of service attack.
This document discusses memory, big data, and security information and event management (SIEM). It outlines how a SIEM infrastructure can be modeled after the human brain's memory to gather and analyze large amounts of data. Specifically, it proposes that machines should be adaptive, interactive, iterative and stateful, and contextual to effectively learn from data over time and identify security threats, similar to how the human brain functions. The document also mentions directed graphs and the five V's of big data - volume, velocity, variety, veracity, and value.
This document discusses different types and formats of data including unstructured, semi-structured, and structured data. It explains that unstructured data has no formal structure, semi-structured data has some defined tags but not a formal schema, and structured data has a formal schema and relationships defined. The document also covers topics like data encoding, compression, magic numbers, and different data formats like CSV, JSON, XML, and more.
Threat hunters collect internal and external data to establish hypotheses about potential threats. They hunt for information to identify real threats and determine an appropriate response. Open source intelligence includes data from social networks, crowd-sourced sites, wikis, and photographs that can provide information about people, organizations, technologies and more. Tools like Google dorking, the Wayback Machine and Shodan allow searching open webpages and networks for intelligence.
The document discusses converting data into information using NumPy and Pandas Python libraries. It covers topics like arrays and matrices, different data formats, NumPy operations for linear algebra and math, and Pandas for working with labeled data and performing analyses like sorting, filtering, and correlations. The goal is to understand how to structure and analyze data using these Python tools.
The document discusses information security, defense mechanisms, and risks. It outlines concepts like data, information, knowledge and wisdom. It describes kill chain models used to investigate security incidents and defenses that use layers like deterrence, detection, protection, reaction, recovery, and auditing. The document also covers risks, costs, benefits, and harm from physical, economic, psychological and reputational impacts.
This document discusses cybersecurity, intelligence, and the differences between human and machine intelligence. It provides an overview of cybersecurity job roles and frameworks. It also covers types of intelligence including naturalist, musical, logical-mathematical, existential, and inter-personal. Humans are described as having advantages in areas like creativity, perception, memory, verbal skills, and reasoning compared to current computer capabilities. Motivations for cyberattacks include entertainment, hacktivism, financial gain, spying, and revenge.
The document discusses ARTiFACTS, a platform that uses blockchain technology to provide attribution for research works. It allows researchers to establish proof of authorship, protect and share research materials, and receive valid attribution and credit for any research output. Researchers, scholars, and publishers can integrate with the ARTiFACTS open platform. It provides a case study of its partnership with the journal JBBA, where researchers can link supporting files and publications to receive citations.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Browser-based Crypto M, C. F Mondschein
1. Browser-based crypto mining and EU data
protection and privacy law:
a critical assessment and possible opportunities for
the monetisation for web services
Christopher F. Mondschein
Researcher at the European Centre on Privacy and Cybersecurity (ECPC),
Maastricht University
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University
2. 2
Browser-based Crypto Mining: the Good, the Bad and
the Ugly
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University
3. Browser-based Crypto Mining
PoW
X
X• Explanation: A user visits a website that deploys a
cryptocurrency miner. The computational power of the
end-user device is utilized to mine cryptocurrencies for
the benefit of the website or service that deploys the
miner.
• Examples: Coinhive, Crypto-Loot, CoinImp, Minr,
deepMiner, JSECoin and Coinhave, etc.
• Deployment: API (JavaScript, WebAssembly), CAPTHCA,
shortlinkservice.
• Prevalent cryptocurrency mined is Monero.
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University
4. EU Data Protection & Privacy Law
• Privacy and data protection are separate but intertwined fundamental rights in EU
law.
• GDPR: data protection – processing of personal data does browser mining entail
processing of personal data?
• ePrivacy Framework (Directive and proposed Regulation): protection of privacy of
end-user devices.
• ePrivacy Framework is lex specialis to GDPR: ‘(…) to particularize and to complement
(…)’.
• Article 5(3) ePD: Consent & prior information necessary; also applies to non-personal
data (‘storing of information, or the gaining of access to information already stored’)
• Article 8 ePR: ‘the use of processing and storage capabilities of terminal equipment
and the collection of information from end-users’ terminal equipment’.
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University
5. Consent and Information
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University
• Information for users:
- ‘clear and comprehensive information’ with reference to GDPR.
- identification of relevant actors (controller(s), processor(s), third parties who receive personal data),
purposes and legal bases, the rights of data subjects, the data transfers to non-EU/EEA states,
automated decision-making.
relevance of this information for browser mining since no personal data is processed? What
information should be provided?
• Valid consent under the ePD and ePR:
- freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he
or she, by a statement or by a clear affirmative action.
- Consent must be given prior to running of script.
- Demonstrating the collection of valid consent even if no processing of personal data? This would
result in the processing of personal data to be able to demonstrate consent.
Monetization methods for web services devoid of any interest in the person behind the device were not
envisioned by the legislator, creating legal uncertainty regarding the application of the law to browser mining
6. Monetization of Web Services & Tracking walls
• Tracking walls: making access to
media or services on websites
conditional upon accepting tracking.
• Supports programmatic
advertisement negative impact on
user privacy and protection of
personal data.
• The practice is contested in law but
sourrounded by legal uncertainty
(failure of ePR proposal, DPA
guidance, CJEU in Planet49).
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University
7. Browser Mining as an Alternative?
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University
• Tracking walls = zero-sum game: user privacy vs website
operator revenue.
• Prohibition of tracking walls, permitted only when browser
mining is an option.
• Proposed ePrivacy Regulation: option to include browser mining
as an alternative (prohibition of parallel use).
• Clarification in Regulation of cases were no personal data is
processed but there is still reliance on reference to GDPR for
information and consent.
8. Thank you for your attention!
c.mondschein@maastrichtuniversity.nl
linkedin.com/in/christophermondschein
www.maastrichtuniversity.nl/ecpc | twitter: @ecpcmaastricht
Blockchain International Scientific Conference, 11 March 2020, Edinburgh Napier University